Unable to Access Private Endpoints from App Service in Azure

Krysynskyi Andrii MTAC-IRL 20 Reputation points
2025-03-14T16:45:19.7566667+00:00

The App Service (Linux Container) with virtual network integration has suddenly stopped working. When attempting to run bash commands(from KUDO Console) for any of the private endpoints, the following errors occur:

dig 
connection timed out; no servers could be reached 
tcpping 
no response (timeout) 

There are two virtual networks: one hub and one spoke. All private endpoints are located in the hub, while the App Service is integrated into the spoke VNet. The hub and spoke topology is managed by Azure Network Manager, and the connectivity configuration has been deployed, and peering created between the VNets.

Private DNS zones and links to networks are configured, and Azure DNS is being used.

When the connectivity configuration is removed and redeployed, nslookup and dig return proper results for a brief period, but tcpping continues to timeout. Eventually, nslookup and dig start timing out again.

This configuration was working properly until recently, and there have been no changes to the network configuration.

Any ideas on how to resolve this issue?

Thanks, Andrii

Azure App Service
Azure App Service
Azure App Service is a service used to create and deploy scalable, mission-critical web apps.
8,659 questions
{count} votes

Accepted answer
  1. Bodapati Harish 320 Reputation points Microsoft External Staff
    2025-03-18T11:21:15.2+00:00

    Hello @Krysynskyi Andrii MTAC-IRL ,

    The issue is that your App Service is having trouble resolving private endpoints and connecting over the network. Since this setup was working before, here are a few things you might want to check:

    • First, make sure the VNet peering and routing are still intact. The changes in the network configuration can impact connectivity.
    • Try running this command from Kudu to check if the private DNS resolution is working:      

    nslookup <your-private-endpoint>.privatelink.<service>.azure.com 168.63.129.16

           If that fails, it could mean that your Private DNS zone is not correctly linked to both VNets.

    • Also, check if there are any NSGs, UDRs, or firewalls that might be blocking traffic from the App Service subnet to the private endpoint.
    • You can do a direct connectivity test using:       curl -v http://<private-endpoint-ip>      

    If this works, then it's likely a DNS issue. If it doesn't, then it might be a network-related problem.

    • A simple restart of the App Service can help. If the issue persists, you could try removing and re-adding the VNet integration.
    • Finally, it might be worth checking Azure Service Health to see if there are any ongoing issues affecting App Service, VNet integration, or Private DNS.

    Hope this helps! Let me know if you need any further details.

    Please remember to "Accept Answer" if the solution has helped, so that others in the community facing similar issues can easily find the solution.


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.